Sciweavers

631 search results - page 27 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
TIFS
2011
252views Education» more  TIFS 2011»
13 years 3 months ago
Secure Device Pairing Based on a Visual Channel: Design and Usability Study
— “Pairing” is the establishment of authenticated key agreement between two devices over a wireless channel. Such devices are ad hoc in nature as they lack any common preshar...
Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N...
ECIS
2003
13 years 10 months ago
Internet enabled supply chain integration for SMEs
Electronic business has a strong influence on the relationships between partners within supply chains. Small and Medium Sized Enterprises (SMEs) need an affordable, integrated set...
Michal Zaremba, Brian Wall, Jim Browne, Szymon Zal...
DCC
2008
IEEE
14 years 8 months ago
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
LaMacchia, Lauter and Mityagin recently presented a strong security definition for authenticated key agreement strengthening the well-known Canetti-Krawczyk definition. They also ...
Berkant Ustaoglu
ACISP
2005
Springer
14 years 2 months ago
Cancelable Key-Based Fingerprint Templates
Biometric based authentication can provide strong security guarantee about the identity of users. Security of biometric data is particularly important as compromise of the data wil...
Russell Ang, Reihaneh Safavi-Naini, Luke McAven
STOC
1995
ACM
107views Algorithms» more  STOC 1995»
14 years 10 days ago
Incremental cryptography and application to virus protection
The goal of incremental cryptography is to design cryptographic algorithms with the property that having applied the algorithm to a document, it is possible to quickly update the ...
Mihir Bellare, Oded Goldreich, Shafi Goldwasser